Network Security is major
part of today’s IT world. Hardware, the computers operating systems, databases
and computer applications are just some of the essential components of
information technology fundamentals. These components are not impenetrable,
that’s where network security comes into play. It is the digital security guard
for the computer and all of these components that is preventing unauthorized
access to data that’s stored on your computer. Pictures, email addresses,
passwords and bank account information are targets that a hacker might want to
obtain and having proper network security will aid in the protection of those
assets.
Information Technology Concepts and
Network Security
Network security relates
to information technology concepts as IT is all about managing, exchanging,
processing and protecting information and network security is ensuring that
information remains intact and available to only the authorized users. Network
security is under the computer science umbrella; however, computer science is
more geared towards computational problems whereas network security is more
about the security of the information on the computer. Network security even
existed in the early years of computers, but in a different manner. Network
security was more about the physical protection of the computers as they were
isolated in different rooms, focusing on ensuring that only required personnel
had physical access to it.
Reliance on Major Hardware
Some major computer
components that network security relies on is the RAM, Storage, CPU and cooling
fans. Sufficient RAM is necessary for computers to run antivirus software
smoothly as the more RAM you have the faster your computer will operate.
Storage is important to network security for maintaining the backup files and
sensitive information. The CPU is the brain of the computer that runs the
program instructions. Network security really can’t exist without the CPU of
the computer. Finally, cooling fans are important as they prevent overheating
of the CPU and other components and overheating can lead to hardware failure,
putting your system at risk. Cooling fans ensure the smooth operation of
security systems by keeping that temperature in check and facilitating optimal
operation.
Network Security and Programing Languages
Network
Security relies on programming languages heavily such as Python and JavaScript.
As described in Codecademy, these programming languages allows for automated
tasks to detect and analyze potential malware (Carpenter, 2021). They can also
be used for penetration testing to help see if any potential vulnerabilities
exist. Main execution methods in network security would be in real time and on a
scheduled basis. Some programs should be running real time to be able to respond
to threats as they happen real time, whereas scans, updates and backups will
probably be on that routine scheduled basis. These programming languages is
what allows these network security systems to operate when intended.
Application Software in Network Security
Application
software much like programming languages plays a vital role in network
security. Security software such as antivirus software like McAfee or Norton
and firewalls will be the first line of defense that can detect and prevent
potential malware from your network. Other software such as a VPN help create
encrypted and secure connections, aiding in the privacy of the user. These
application software’s provide a necessary means to monitor and protect
networks against potential cyberthreats that occur on a daily basis all over
the world. Without these applications running, it leaves your network extremely
vulnerable to hackers who want to get that data on that network and leave your
network in shambles.
Database Management
A
database is where information is stored, managed and where it can be accessed
electronically. A couple examples of this would be how most, if not all
hospitals store patient data or how Amazon keeps track of their inventory. That
all gets inputted into a database of some kind. Database management utilizes
management systems such as Oracle Database to be able to add, edit, query and
delete information within the database. Network securities role in relation to
databases is all about safeguarding the information stored on these databases.
This happens by means of access control, vulnerability management, firewall
protection and system backups and recovery.
Network Architecture, Management and
Security
Network
architecture is composed of the aspects of the network, such as routers,
switches, modems and storage of the data to name a few according to eSecurity
planet (Kime, 2024). Managing that network is all about maintaining and
monitoring that network to ensure it is functioning as intended. Implementing
solid network security can ensure that the hardware and software of that
network are being protected and can withstand the different kinds of cyber
attacks, mitigating security incidents, preventing unauthorized access and
simply maintaining the overall integrity of that network.
References:
Carpenter, A. Codecademy. (2021, Jun 15). What
Programming Languages Are Used in Cybersecurity?. https://www.codecademy.com/resources/blog/what-programming-languages-are-used-in-cybersecurity/
Crocetti, P. (2025, Jan 15). Tech Accelerator. Data
storage management: What is it and why is it important?. https://www.techtarget.com/searchstorage/Data-storage-management-What-is-it-and-why-is-it-important
Kime, C. (2024, Apr 26). eSecurity Planet. Network
Security Architecture: Best Practices & Tools https://www.esecurityplanet.com/networks/network-security-architecture/?form=MG0AV3
Lysecky, S, Vahid, F, Wheatland, N. (2019, February).
TEC 101: Fundamentals of Information Technology & Literacy.
MOOC.org. (2021, Nov 16). Cybersecurity and
Computer Science: What’s the Connection?. https://www.mooc.org/blog/cybersecurity-and-computer-science-whats-the-connection
Comments
Post a Comment